Authorized Access
The following persons are granted access to the Lesley digital environment, subject to this Policy:
- Core Faculty: Eligible upon acceptance of a contract
- Adjunct Faculty and National Faculty: Eligible upon acceptance of a contract
- Students: Eligible upon admittance to a degree program
- Administrators & Staff: Eligible on date of hire
- Alumni
- Emeriti/ae Faculty
- All others and any requests for exceptions to this Policy are subject to the prior written approval of the university’s Chief Information Officer.
All employee (faculty and staff) accounts will expire, and access will end upon separation of the user's relationship with the University with the following exceptions: Retired faculty emeriti will maintain access to their current Lesley email account. Separating employees who are also a current matriculating student or alumnus will be issued a new email account. Exemptions from this policy will be determined on a case-by-case basis.
There are certain situations with approval from the appropriate Dean/Administrator that would allow retired faculty continuation of relevant accounts. Systems administrators may, without additional prior notice, delete computer accounts and files after the termination of a person's qualifying Lesley affiliation.
Data Security, Confidentiality, Access, and Retention
Lesley University users are responsible for protecting the confidentiality and appropriate use of institutional data to which they are given access, ensuring the security of the equipment where such information is held or displayed, ensuring the security of any accounts issued in their name, and abiding by related rights of students, faculty, staff, and others concerning the use and release of personal information, as required by state and federal law or existing university policies.
Lesley University users must follow the Data Security Policy.
In the ordinary course, digital files and information must be retained in accordance with the university’s Record Retention Policy. Review the Record Retention Policy to understand the university’s protocols for keeping certain types of records.
Digital files and information, whether or not created and stored on University resources, may constitute a University record subject to disclosure under federal, state, or local laws, or as a result of an investigation or litigation.
In such cases, the university and certain relevant users will be required to store and may not delete certain files, messages, or other records. In some cases, as with paper records of the university, digital files and information must be searched and disclosed to third parties in response to legally issued subpoenas or court orders.
In addition, in the event of a university investigation for alleged misconduct, digital files and information such as email messages may be viewed, locked, or copied as needed for the investigation or to prevent destruction and loss of information. On occasion, the actions described in this paragraph may be taken by the University without prior specific notice to the person whose account, files, or equipment are being searched. The university may report evidence of misconduct to the appropriate authorities.
Network and System Integrity
All use covered under the scope of this Acceptable Use Policy must comply with state and federal laws, including, but not limited to, the Federal Computer Fraud and Abuse Act, 18 U.S.C. 1030, and other federal law, state law, and university policies.
The university reserves the right to limit access to its resources when policies or laws are violated and to use appropriate means to safeguard its resources, preserve network and system integrity, and ensure continued service delivery at all times. This includes, but is not limited to, monitoring routing information of communications across its network services and transaction records residing on university resources, scanning systems attached to the Lesley network for security problems, disconnecting systems that have become a security hazard, and restricting the material transport across the network or posted on university systems.
Activities and behaviors that threaten the integrity of the computer networks or systems are prohibited on both university-owned and privately-owned equipment operated on or through the university resources. These activities and behaviors include but are not limited to:
- Interference with or disruption of computer systems and networks and related services, including but not limited to the propagation of computer worms, viruses, Trojan Horses, malware, and other harmful content.
- Intentionally or carelessly performing an act that places an excessive load on a computer or network to the extent that other users may be denied service or the use of digital and network networks or information systems may be disrupted.
- Any action that might be harmful to the university digital and network environment, the network, or the data stored on or transported by them or other computers connected to them.
- Failure to comply with authorized requests from designated university officials to discontinue activities that threaten the operation or integrity of computers, system or networks
- Negligently or intentionally revealing passwords or otherwise permitting the use by others of university-assigned accounts for computer and network access. Individual password security is the responsibility of each user. The user is responsible for all uses of their accounts, independent of authorization.
- Altering or attempting to alter files or systems without authorization
- Unauthorized scanning of ports, computers and networks.
- Unauthorized attempts to circumvent data protection schemes or uncover security vulnerabilities.
- Attempting to connect to or alter any university computing or network components without authorization or beyond one's level of authorization, including but not limited to bridges, routers, hubs, wiring and connections.
- Using campus resources to gain unauthorized access to any computer system and/or using someone else's computer without permission.
- Registering a Lesley IP address with any other domain name or registering a Lesley domain name without written authorization from Information Technology.
No Liability/ No Warranty
Lesley University is unable to warrant that its digital and network environment is virus-free; that users with Lesley email accounts will not receive unsolicited email; or that all hardware and/or software used to access the digital and network environment will be compatible with the Lesley systems.
Use and access to Lesley's digital and network environment does not entitle the user to seek indirect, consequential, special, punitive, peremptory, or similar damages from Lesley University in connection with use and access.
Social Media
Blogs, digital media, and social networks, including but not limited to Facebook, Twitter, Flickr, YouTube, LinkedIn and iTunes U, offer new and exciting opportunities for Lesley University faculty, staff, students, and alumni to share knowledge, express creativity, and connect with people who have common interests.
Social media is being used more and more in teaching and online learning. When participating in social media, it is important to always be upfront and honest about who you are and what you represent, use common sense before you post or comment, and respect the values and etiquette of communities you join. And just as in the use of other Lesley-provided technology, users of Lesley's digital and network environments must be aware of the policies and laws that apply to social media, including university policies and federal and state law.
Users should be aware that information posted online or otherwise made available through social and digital media, including pictures and text, may become very difficult to completely remove from the internet or elsewhere even after deleting the material. Also, any pictures and text placed online can become the property of these sites once they are posted or otherwise made available.
To help gauge information appropriate to post, users need to consider what information they want available to the world not just now but in the future. Potential employers, scholarship committees, graduate school admissions committees, or even potential roommates often perform "background checks" by searching the web. So, although the material may be legal, it still may ruin potential career or personal prospects.
Sending Email Messages
Lesley University reserves the right to send email to its own users, on an individual and mass basis.
Either the President, a member of the President's Cabinet, or the Director of the Office of Communications must approve in advance any mass email announcement.
This Acceptable Use Policy is not intended to create a contract between Lesley University and its students, employees, or other persons. Lesley reserves the right to amend or revoke this and other policies at any time without notice.
Revised January 13, 2022